Showing 1 - 20 results of 31 for search 'server ((correction algorithm) OR (selection algorithm))', query time: 0.21s Refine Results
  1. 1
  2. 2

    Edge server registration phase. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  3. 3

    CorrEA: A Web Server for Optimizing Correlations between Calculated Energies and Activities in Ligand–Receptor Systems Considering Multiple Binding Site Conformations by Sergio Alfaro (9765813)

    Published 2025
    “…CorrEA performs a genetic algorithm (GA) selection to extract a representative complex for each ligand that better adjusts the global correlation between calculated docking energy values and experimental logarithmic biological activities. …”
  4. 4

    PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors by Francisca Joseli Freitas de Sousa (22640155)

    Published 2025
    “…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
  5. 5

    PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors by Francisca Joseli Freitas de Sousa (22640155)

    Published 2025
    “…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
  6. 6

    PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors by Francisca Joseli Freitas de Sousa (22640155)

    Published 2025
    “…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
  7. 7
  8. 8

    Network model. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  9. 9

    Comparative Analysis (Performance Metrics). by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  10. 10

    SN/IoT or user registration phase. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  11. 11

    Communication costs in bits. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  12. 12

    Communication costs. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  13. 13

    Mutual authentication phase. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  14. 14

    Notations used and their descriptions. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  15. 15

    Comparative Analysis (Security Functionalities). by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  16. 16

    Storage Cost of the Proposed Protocol. by Naif Alzahrani (19992885)

    Published 2025
    “…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
  17. 17

    Comparison with existing work. by Khondokar Oliullah (21553289)

    Published 2025
    “…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
  18. 18

    Registration phase. by Khondokar Oliullah (21553289)

    Published 2025
    “…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
  19. 19

    Performance comparison of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
  20. 20

    Classification Report for the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”